One particularly useful tool on my Mac is the pbcopy utility,
which takes standard input and puts it on the pasteboard
(this is known as the "clipboard" on some other systems). Its sister
application, pbpaste is also useful (it outputs your pasteboard to
standard output when your pasteboard contains data that can be represented in
some sort of text form—if you have image data copied, for example,
pbpaste yields no output).

I find this particularly useful for getting information from the command
line into a GUI application.

Wouldn't it be even more useful if we could
pbcopy from a remote SSH session? Indeed it is useful. Here's
how.

The first thing you need is a listener on your local machine. Luckily,
Apple has provided us with launchd and its administration utility,
launchctl. This is basically [x]inetd for your Mac
(plus a bunch of other potentially great stuff that I simply don't understand).
Put the following in ~/Library/LaunchAgents/pbcopy.plist:

…then try pasting. You should have hello (followed by a
newline) on your pasteboard.

The next step is tying this into SSH. Add
RemoteForward 2224 127.0.0.1:2224 to ~/.ssh/config.
This will tell your SSH connections to automatically forward the remote
machine's local port
2224 to your local machine, on the same port, over your encrypted
SSH tunnel. It's essentially the same thing as adding
-R2224:localhost:2224 to your SSH connection command.

Now you have a listener on your local machine, and a secure tunnel from
remote servers to this listener. We need one more piece to tie everything
together. Put the following in a file (preferably in your path) on the remote
machine(s) where you'd like a pipe-friendly pasteboard:

cat | nc -q1 localhost 2224

…I like to put this in ~/bin/pbcopy or
/usr/local/bin/pbcopy on servers where I have root. You'll also
need to chmod +x this file to make it executable. You'll need
the nc executable, which is often available in a
package called netcat. This invocation of nc takes
standard input and pushes it to localhost on port
2224.

Now you should have a useful pbcopy on your remote server(s).
Be aware, though, that there is no additional security on this port connection.
If someone on the remote machine can connect to localhost:2224,
they can inject something into your pasteboard. This is usually safe, but you should
definitely keep it in mind. Also, if you have multiple users using this
technique on the same server, you'll probably want to change the port numbers
for each user.

I use this technique all the time. Now you can too. Hope it's helpful.

(Note: I'm tagging this PHP and Web because it's likely to overlap with those groups.)